CPUID has since confirmed the breach, pinning it on a compromised backend component rather than tampering with its software builds.
“Investigations are still ongoing, but it appears that a secondary feature (basically a side API) was compromised for approximately six hours between April 9 and April 10, causing the main website to randomly display malicious links (our signed original files were not compromised),” one of the site’s owners said in a post on X. “The breach was found and has since been fixed.”
You must log in or register to comment.


